支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 93c04dd929eb93e88f8094e26f6cb1a49e54e884

来源
关联漏洞
标题:Canonical Ubuntu Linux 安全漏洞 (CVE-2023-2640)
Description:Canonical Ubuntu Linux是英国科能软件(Canonical)公司的一套Linux操作系统。 Canonical Ubuntu Linux存在安全漏洞,该漏洞源于内核中的OverlayFS没有执行权限检查,导致存在权限提升漏洞。
Description
GameOver(lay) Ubuntu Privilege Escalation
介绍
# GameOver(lay) Ubuntu Privilege Escalation

### CVE-2023-2640

https://www.cvedetails.com/cve/CVE-2023-2640/

On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.

### CVE-2023-32629

https://www.cvedetails.com/cve/CVE-2023-32629/

Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels.

### Vulnerable kernels

| Kernel version | Ubuntu release |
| --- | --- |
| 6.2.0 | Ubuntu 23.04 (Lunar Lobster) / Ubuntu 22.04 LTS (Jammy Jellyfish) |
| 5.19.0 | Ubuntu 22.10 (Kinetic Kudu) / Ubuntu 22.04 LTS (Jammy Jellyfish) |
| 5.4.0 | Ubuntu 22.04 LTS (Local Fossa) / Ubuntu 18.04 LTS (Bionic Beaver) |

### Usage
Tested on kernels 5.19.0 and 6.2.0.

1. Just run the script in the low-priv shell.
```
   ./exploit.sh
```
2. Remember to type "exit" to finish the root shell and leave the house cleaned.

### Example
![Untitled](https://github.com/g1vi/CVE-2023-2640-CVE-2023-32629/assets/120142960/13f8463c-6c5f-400c-a4d9-ab19cb0e5738)

### License
Feel free to use or modify whenever and wherever you like.
文件快照

[4.0K] /data/pocs/93c04dd929eb93e88f8094e26f6cb1a49e54e884 ├── [ 558] exploit.sh └── [1.3K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。